1,789
Views
10
CrossRef citations to date
0
Altmetric
Articles

IS STUXNET PHYSICAL? DOES IT MATTER?

Pages 68-79 | Published online: 17 Apr 2013

REFERENCES

  • Antolin-Jenkins , Vida M. 2005 . Defining the Parameters of Cyberwar Operations: Looking for Law in All the Wrong Places . Naval Law Review , 51 : 132 – 174 .
  • Barlow , John Perry 1996 A Declaration of the Independence of Cyberspace , 8 February accessed 20 March 2013, available at: https://projects.eff.org/~barlow/Declaration-Final.html; Internet .
  • Barney , Steven M. 2001 . Innocent Packets: Applying Navigational Regimes from the Law of the Sea Convention by Analogy to the Realm of Cyberspace . Naval Law Review , 48 : 56 – 83 .
  • Benatar , Marco . 2009 . The Use of Cyber Force: Need for Legal Justification? . Goettingen Journal of International Law , 1 ( 3 ) : 375 – 396 .
  • Chen , Thomas M. 2010 . Stuxnet, the Real Start of Cyberwarfare? . IEEE Network , 24 ( 6 ) : 2 – 3 . doi: 10.1109/MNET.2010.5634434
  • Cook , James . 2010 . Cyberation’ and Just War Doctrine: A Response to Randall Dipert . Journal of Military Ethics , 9 ( 4 ) : 411 – 423 . doi: 10.1080/15027570.2010.536406
  • Dipert , Randall R. 2010 . The Ethics of Cyberwarfare . Journal of Military Ethics , 9 ( 4 ) : 384 – 410 . doi: 10.1080/15027570.2010.536404
  • Farwell , James P. and Rohozinski , Rafal . 2011 . Stuxnet and the Future of Cyber War . Survival: Global Politics and Strategy , 53 ( 1 ) : 23 – 40 .
  • Franzese , Patrick W. 2009 . Sovereignty in Cyberspace: Can It Exist? . Air Force Law Review , 68 ( 1 ) : 1 – 42 .
  • Gibson , William . 1984 . Neuromancer , 1st ed , New York : Ace Books .
  • Jolley , Jason D. 2012 Article 2(4) and Cyber Warfare: How Do Old Rules Control the Brave New World? 12 July accessed 20 March 2013, available at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2128301; Internet .
  • Landauer , Rolf 1991 Information is Physical , Physics Today , 44 5 , 23 – 29 . doi: 10.1063/1.881299
  • Liles , Samuel , Rogers , Marcus , Dietz , J. Eric , & Larson , Dean 2012 Applying Traditional Military Principles to Cyber Warfare . Paper presented at 2012 4th International Conference on Cyber Conflict , Tallinn , 5–8 June .
  • Lucas , George R. Jr . 2010 . Postmodern War . Journal of Military Ethics , 9 ( 4 ) : 289 – 298 . doi: 10.1080/15027570.2010.536399
  • Orend , Brian . 2006 . The Morality of War , Peterborough : Broadview Press .
  • Rowe , Neil C. 2010 . The Ethics of Cyberweapons in Warfare . International Journal of Technoethics , 1 ( 1 ) : 20 – 31 . doi: 10.4018/jte.2010081002
  • Schmitt , Michael . 1999 . Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework . Columbia Journal of Transnational Law , 37 ( 3 ) : 885 – 937 .
  • Strawser , Bradley J. 2010 . Moral Predators: The Duty to Employ Uninhabited Aerial Vehicles . Journal of Military Ethics , 9 ( 4 ) : 342 – 368 . doi: 10.1080/15027570.2010.536403
  • Taddeo , Mariarosaria 2012 An Analysis for a Just Cyber-Warfare . Paper presented at 2012 4th International Conference on Cyber Conflict , Tallinn , 5–8 June .
  • United States 2011 International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World , accessed 20 March 2013, available at: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf; Internet .
  • Walzer , Michael . 2006 . Just and Unjust Wars , 4th ed , New York : Basic Books .
  • Yannakogeorgos , Panayotis A. 2012 . Internet Governance and National Security . Strategic Studies , 6 ( 3 ) : 102 – 125 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.